Security Basics mailing list archives

Re: Digital signature Question


From: Byron Sonne <blsonne () rogers com>
Date: Thu, 06 Nov 2003 16:14:11 -0500

Main Question:  When I hash a message to authenticate it, and then encrypt
the hash result with a private key to make a digital signature, is the
private key I'm using at that point (normally) a shared symmetric private
key or my private key from my private/public key pair?

I'd say it's your private key from from your key pair.

Yeah, sometimes words aren't the best medium for explaining things. If I could locate the nice diagrams in my cisco course materials, I'd scan it in and post it... but maybe these'll help out:

http://www.uic.edu/depts/accc/newsletter/adn26/figure3.html
http://educators.mainfunction.com/Resources/display.asp?page=digital_sign
http://www.state.ma.us/itd/legal/crypto-3.htm
http://www.ecommerce.or.th/APEC-Workshop2002/ppt/slide/john_daly2.pdf

Regards,
Byron

--

        For good, return good. For evil, return justice.


---------------------------------------------------------------------------
Forum Systems PRESIDIO: PGP / XML GATEWAY APPLIANCE
The Presidio integrates PGP data encryption and XML Web Services security to simplify the management and deployment of PGP and reduce overall PGP costs by up to 80%. FREE WHITEPAPER & 30 Day Trial - http://www.securityfocus.com/sponsor/ForumSystems_security-basics_031027 ----------------------------------------------------------------------------


Current thread: